Share

THE IMPACT OF THE PROLIFERATION OF CHURCHES ON IDENTITY THEFT IN NIGERIA 7TH AUGUST 2017

By Saron Messembe Obia (Independent Researcher/Consultant)

Abstract

The proliferation of churches has been identified as a catalyst for economic development in Nigeria, a country reputed with powerful prophets, apostles and so called “spiritual fathers”. This massive creation of churches has been linked to the quest for wealth and power. Though a blessing, it has however led to an increase in non-conventional crimes such as identity theft and cybercrime. Given that the number of victims keep increase at a geometric rate, there is need for cooperation between national and international stakeholders to help curb and why not eliminate this evil. This paper discusses the social aspects, while at the same time exposing the various modus operandi of the criminals to help developing new policies and boost investigation strategies.

Keywords: Identity theft, Proliferation of churches

Introduction

The year 2016 registered an increase in electronic payment in Nigeria, added to US$460 million from 2011 to 2015 GDP (NeFF annual report of, 2016). This has equally been accompanied with electronic payment breaches which warrants security policies in relation to non-conventional crimes. The country is reputed for identity theft in the world, as the activity continues to flourish even at the international level with new trends (Hall, 2012). Following a six-week investigation by Simi Valley into a Nigerian fraud ring in 2012, criminals were crackdown for stolen payment card information (PCI) and credit card fraud (CCF). They were liable for over $2 million in credit losses (Ventura County News, 2012). Also, there has been serious debates on what is considered a crime, with the National Information Technology Development Agency (NITDA) in Nigeria which pointed out some lapses of section 14 of the Nigerian Constitution, which states that “no person shall be punished for a crime unless such crime is prohibited by written law and specific sanctions are provided for the violation (see www.NITDA.COM). Though the case of Akeem Adejumo Vs the National Aeronautic and Space Agency of the United States exposed the necessity of a law on cyber security and cyber criminality, measures of combating non-conventional crimes is still a challenge (Odumesi, 2014).

Identity theft landscape

Identity theft is a situation where an individual steals data that defines personal identity such as name, social security number, bank account number and credit card number to reap the benefits. The Nigerian legislation provides sanctions with imprisonment related to this offence in section 419 of the penal code.

Those engaged in the aforementioned crimes are usually called 419 ners or yahoo-boys. They conduct their activities both at national and international level. Following a report by Nigeria Interbank Settlement System (NIBSS) in 2016, fraud cases grew by 82% over figures recounted in 2015, and a huge 1200% over 2014 due of new payment platforms, and losses reduced by 2.7% as compared to losses in 2015. The statistics above revealed that digital payments is prone to fraud attempts and attacks in Nigeria. But the issue is how effective are security agencies and stakeholders collaborating to combat this imminent threat at both national and international level? This is because identity thieves pose as prophets, apostle and even agents of some churches to defraud Christians online in the name of sowing seeds, prophecies and miracles due to the proliferation of churches in the country.

Identity theft includes but not limits to

  • Skimming
  • Spoofing attack( Phishing)
  • Vishing
  • Social engineering
  • Dumpster diving

The proliferation of churches in Nigeria

There have been a massive proliferation of Pentecostal churches in Nigeria with emerging security challenges such as cybercrime and identity theft on its population, foreigners and multinationals (Folaranmi et al). The growth of Pentecostal Churches in Nigeria is due to unemployment and the desire to acquire fast wealth (Agha, 2013). But the rhetorical questions are; why do other pastors or men of “God” talk of spiritual fathers? Why has identity theft been integrated in the Christian milieu? Who are the victims of this scheme? Drawing from the perception of Aladura group of churches, prayer opens all doors. Therefore, they believe firmly in the of power prayer, which they claim is under estimated and used sparingly by the other Christian churches (Agha, 2013). The effective use of prayer in healing and dispelling evil spirits and occultists is a major reasons why many people abandoned their mother church and flock to the Aladura group of churches. Christians attest that prayers accompanied with the ringing of bells and vociferation of Halleluiah issues related to necromancy, unemployment, women infertility and stagnation in life are broken (Agha, 2013).

The impact of the proliferation of churches on identity theft in Nigeria

Case study 1: Identity theft on social networking sites

Nigeria was listed among the world’s most malicious site for internet browsing in 2007 (Ribadu, 2007). Identity thieves commit crimes using Facebook, twitter, and Hotmail just to name a few. Internet users or subscribers connected to social media sites like Facebook and the professional networking site LinkedIn are faced with the menace of cybercrime and identity theft. However, users don’t take the time to scroll on the details or even adjust the settings which reduces risk exposure. Most users are not aware of the risk of using the same name and password (two factor-authentication) for their various social media platforms and online banking. Identity thieves easily access accounts which are unsafe, through phishing and malware attacks, hacking unsecure social media sites for potential un-encrypted sensitive data.

The attack on Google’s social networking site “Orkut” to access financial information and passwords, and the instant messenger phishing attack on My Space to grip personal identifiable information of users in June 2006 (Social Networks a hacker’s paradise, 2006) demonstrated the desire of identity thieves to access the vast amount of information that users release on the social networking sites.

One of the major ways hackers operate is by compromising their victim’s email address book, and generating emails addresses belonging to colleagues and friends, and later request their information by asking them to click on specific links or download information which then grants them access to their computers.

The proliferation of churches in Nigeria has greatly contributed to new social networking vulnerability trends by identity thieves. Facebook is one of the major social networking sites used to victimize Christians searching for miracles and “men of god” to expose their problems. In an interview with a victim on Facebook, the user disclosed that “a Facebook account owner may no longer have access to their account by typing amen on a post”. The victim further disclosed that after having her account hacked, she received messages from her friends requesting for financial assistance.

Another victim revealed that identity thieves use photos of popular prophets and apostles in Nigeria to post prophecies, and tag account numbers for Christians to sow seeds, pay tithes, purchase of spiritual items (e.g. anointing water) and contribute for the less privilege. Some go to the extent of sending fake invitations for more money for reservation to meet the so called “men of god” or “prophets”. The patterns keeps changing from click on links, to downloading preaching videos and friend suggestions.

Case study 2: Wiring (banking system and ATM fraud) in Nigeria

Nigeria have good internet services and software, this is in line with the proliferation of banks in the country. The banking system is well organized with the use of ATM cards, but the spread of churches has indeed increased vulnerability even in the banking sector. They are four major issues as concerns wiring in Nigeria; ATM code, exchange of ATM card, four key numbers on credit card, Phishing and skimming of ATM card.

Scenario 1: Exchange of ATM card

Drawing from the sociology of crimes in Nigeria, ATM cards exchange is becoming rampant. When someone approach an ATM machine and is unable to effectuate a transaction, the criminal comes by and help carry out the operation and later exchange the cards while handing to the person. The victim may only discover when trying to carry out a different operation or by an alert by the bank about huge sum of withdrawal. Victims of this scheme are mostly ageing people, and those who are no vest with ATM machines.

Scenario 2: Phishing of ATM card data

One of the major sources of victimization is through complementary cards issued to individuals. These cards often bears the name, phone number, company address, profession and email of the individual. Sometimes, people use the same email which they created their bank account to carry out other services. As such, criminals send fraudulent emails that seem to be from a legitimate sources to victims to provide sensitive information about their financial pay roll. Another pattern adopted is by clicking on links which send the victim to fraudulent websites of popular churches, which requires name of holder of account, account number, pin of card usually for an update per the criminal posing as an agent of the bank.

Conclusion

Tertiary institutions encounter serious security challenges due to organized criminal networks and illegal groups with the proliferation of churches which bring in huge finance in to Nigerian banks. But the impact of this proliferation seem to be negative, as dishonest staffs collaborate with criminal rings to access vital data of customers which facilitate unauthorized transactions and withdrawal without alerting security agencies. Transactions are usually effectuated through domiciliary accounts, credit cards, Money Gram and Western Union (Tade & Aliyu, 2011). Drawing from patterns of Cameroon, non-conventional crimes help in paying tuition fees, acquiring properties, and sustaining lives (Abia et al, 2010). Though Nigeria has many legislations in relation to non-convention crimes like identity theft, the collaboration of criminals with some dishonest staffs is a serious challenge in stopping identity theft. As such, the government must provide jobs, in order to fight unemployment, combat corruption and strengthen the fight against non- conventional crimes like identity theft.

References

  • Abia, A. et al (2010). Cameroonian youths, their attractions to scamming and strategies to divert attention: International NGO Journal, Cameroon.
  • A Changing Payments Ecosystem: The Security Challenge, NeFF Annual Report of 2016
  • Adesanya, I.O. (2004), “Proliferation of Churches Bane or Blessing” Journal of Contemporary Issues in Education. Vol. 11, No. 1 [55-60].
  • Agha, U. A. (2013). The Retreat of the Holy Spirit in Emergence of African Independent Churches. Enugu: Snaaps Nigeria publishers.
  • Auko, M. (2004) 17 ways of stopping financial corruption in Nigeria
  • Anderson, A. (2001). African Reformation: African Initiated Christianity in the 20th Century. Trenton, NJ: Africa World Press, Inc.
  • Bernadin, M. (2010). “The Church is Growing-Corruption is Growing”.
  • Deji, A. & Ademola, S.I. (1997). African Indigenous Churches: A Historical Perspective. Lagos: Greater Heights Publication
  • Fayomi M.O. (1993). The Christian Response to Our Moral and Social Crisis, Ado-Ekiti: Hope Paper Mills.
  • Folaranmi et al User Perception of Security Measures within Church Premises North Central Nigeria. Lagos Journal of Environmental studies, Vol 8 (No 2) November
  • Hall, A. (2012) Credit Card Fraud and Social Engineering: Mitigation of Identity Theft Related Losses Requires More Than Technology
  • Lynette I. & Donald J. (2014) In God we trust: A case of church financial fraud. Journal of Business Cases and Applications Volume 11 – July, 2014
  • Odumesi, J. (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria: International Journal of Sociology and Anthropology.
  • Oludayo Tade & Ibrahim Aliyu (2011) Social Organization of Internet Fraud among University Undergraduates in Nigeria. University of Ibadan, Nigeria
  • Okai, M. (2016) The Proliferation of Churches in Modern Nigeria: ASocio-Political and Economic Reconsiderations, Adeleke University, Osun State, Nigeria
  • Ribadu N. (2007). Cyber-crime and Commercial Fraud: A Nigerian Perspective: presented at the Congress Celebrating the Fortieth Annual Session of the UNCITRAL (United Nations Commission On International Trade Law), Vienna, Austria, 9-12 July.

© 2024 IACSP Southeast Asia Region